Monday, November 22, 2010

NASA, Google, Microsoft, Yahoo!, World Bank team to offer hackathon

Software bug derailed Windows bid to top Linux in supercomputing speed | User activity monitoring answers the age-old questions of who, what and when

Network World Security

Forward this to a Friend >>>


NASA, Google, Microsoft, Yahoo!, World Bank team to offer hackathon
Group offers way for software community to crowdsource codejams Technology can make some strange bedfellows.  NASA, Google, Microsoft, The World Bank and Yahoo! are inviting software developers, computer experts and students to a hackathon where they will have a specific time to solve significant software challenges. Read More


WHITE PAPER: HP

Virtualizing Network Connections and Capacity
Read this whitepaper to learn how HP FlexFabric can provision your network resources efficiently and securely to accelerate deployment of virtualized workloads. Read Now

WHITE PAPER: Tripwire

A Pragmatic Approach to SIEM
In this white paper, security and compliance eWPxpert Dr. Anton Chuvakin explains how to take advantage of this opportunity. Read Now.

Software bug derailed Windows bid to top Linux in supercomputing speed
Windows or Linux? Tokyo HPC chief lets users decideA few days ago, we told you about Microsoft's surprising bid to join the petascale computing age. Windows HPC Server, it seems, was able to hit petaflop speeds on Japan's largest supercomputer, but the achievement was not recognized by the bi-annual Top 500 list because Linux performed better on the same machine. Read More

User activity monitoring answers the age-old questions of who, what and when
The city of Richmond, Va., had a user access problem. Due to an inadvertent misconfiguration of Active Directory, internal users were able to access systems and databases that they shouldn't have had access to. A user activity monitoring tool helped the city see the inappropriate access and lock down their systems. Read More

Prepare for Cyber Monday Shopping Risks
Some of the greatest bargains of the holiday shopping season are offered online on Cyber Monday. Of course, cyber criminals and malware developers are also gearing up for the biggest online shopping day of the year, so you better have your defenses up before you jump online and start making purchases. Read More


WHITE PAPER: F5 Networks

The Antidote to DNS Cache Poisoning and Other DNS Attacks
Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn't working, then your business likely isn't either. Secure your business and web presence with Domain Name System Security Extensions (DNSSEC). Learn more!

UK gov't spends millions on IT security architects
The Department of Health (DH) has revealed it spent £10.1 million on information security architects over the past four years, mostly for the £13bn NHS National Programme for IT (NPfIT). Read More

Internet hijack claims denied by China Telecom
China Telecom has issued a curt denial that it was complicit in a claimed 'hijacking' of Internet traffic earlier this year that saw large volumes of data between sensitive US military and commercial websites briefly travelling through its serve Read More

World Toilet Day spotlights the throne
Despite global humor World Toilet Day points to serious issues Today is World Toilet Day and with it comes the requisite humor.  But the underlying purpose of the day is to have people in all countries to take action, increase awareness of toilet user's right to a better toilet environment, and to demand for it from toilet owners. Read More


WHITE PAPER: IBM

Protecting Sensitive Data in Non-Production Environments
The ideal data privacy solution must provide the necessary data masking techniques to satisfy the simplest and most complex policy requirements. These techniques must produce results that accurately mask context-sensitive data and include a way to propagate masked data elements consistently across applications and operating environments. Read now

Apple patches critical 'drive-by' Safari bugs
Apple today patched 27 vulnerabilities in Safari for Mac OS X and Windows, 85% of them critical bugs that could be exploited to hijack Macs or PCs. Read More

Antivirus trouble, emergency power and hacking Kinect
Mark Gibbs points out an issue with Time Machine and Sophos AV, looks at mobile emergency power and is in awe of what hackers are doing with Kinect. Read More

The X-Force experience in SCADA security and terrorism
At a power plant where they were trying to negotiate a contract for penetration testing, they met resistance from executives who were confident that their systems were so secure that no break-ins were possible. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Microsoft Windows after 25 years: A visual history
More than nine out of 10 computers run some version of Windows. But no one could have predicted that would be the case when Windows 1.0 launched 25 years ago as a graphical front end for MS-DOS. Here's a look at Windows through the years and some thoughts on what the future might hold.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Bug derailed Windows bid to top Linux in supercomputing speed
  2. Airports can legally opt-out, kick TSA program to the curb
  3. Google, Apple looking to introduce NFC capable smartphones
  4. Industrial Ethernet helped rescue Chilean miners
  5. Twitter generation failed The Science Guy? Nonsense.
  6. Free BlackBerry apps for the holidays
  7. Installing and using Ubuntu Netbook Edition
  8. Why U.S. IT jobs aren't coming back
  9. Report sounds alarm on China's rerouting of U.S. Internet traffic
  10. Google Chrome tops 'Dirty Dozen' vulnerable apps list

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment